things you should know about federated identity management ,
ws-trust and ws-federation. https ,
understanding ws-federation. https://msdn.microsoft.com/en-us/ library/bb498017 ,
[Online ; accessed 08, 2015. ,
A calculus for access control in distributed systems, ACM Transactions on Programming Languages and Systems, vol.15, issue.4, pp.706-734, 1993. ,
DOI : 10.1145/155183.155225
Supporting trust in virtual communities, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, p.9, 2000. ,
DOI : 10.1109/HICSS.2000.926814
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.7883
Modeling in Event-B : system and software engineering, 2010. ,
DOI : 10.1017/CBO9781139195881
Toward a decentralized trust-based access control system for dynamic collaboration, Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, 2005., pp.317-324, 2005. ,
DOI : 10.1109/IAW.2005.1495969
URL : http://cc1.sctc.mnscu.edu/infosec/WestPointWorkshop2005/cdrom/PDFs/Papers/S14P03.pdf
Business Process Design by Reusing Business Process Fragments from the Cloud, 2015 IEEE 8th International Conference on Service-Oriented Computing and Applications (SOCA), p.8, 2015. ,
DOI : 10.1109/SOCA.2015.37
language for role-based separation of duty constraints, Proceedings of the fourth ACM workshop on Role-based access control , RBAC '99, pp.43-54, 1999. ,
DOI : 10.1145/319171.319176
A Distributed Access Control Architecture for Cloud Computing, IEEE Software, vol.29, issue.2, pp.36-44, 2011. ,
DOI : 10.1109/MS.2011.153
A model for team-based access control, Information Technology : Coding and Computing Proceedings. ITCC 2004. International Conference on, pp.450-454, 2004. ,
Methods for access control : advances and limitations, 2001. ,
Persona, ACM SIGCOMM Computer Communication Review, vol.39, issue.4, pp.135-146, 2009. ,
DOI : 10.1145/1594977.1592585
Using event calculus to formalise policy specification and analysis, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.26-39, 2003. ,
DOI : 10.1109/POLICY.2003.1206955
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.5437
Framework for role-based delegation models, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), pp.168-176, 2000. ,
DOI : 10.1109/ACSAC.2000.898870
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.9343
Role-Based Delegation Model/ Hierarchical Roles (RBDM1), 20th Annual Computer Security Applications Conference, pp.396-404, 2004. ,
DOI : 10.1109/CSAC.2004.31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.160.9381
A role-based delegation model and some extensions, 23rd National Information Systems Security Conference, pp.396-404, 2000. ,
Secure computer system : Unified exposition and multics interpretation, 1976. ,
Managing Delegation in Access Control Models, 15th International Conference on Advanced Computing and Communications (ADCOM 2007), pp.744-751, 2007. ,
DOI : 10.1109/ADCOM.2007.105
TRBAC, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.191-233, 2001. ,
DOI : 10.1145/344287.344298
A logical framework for reasoning about access control models, ACM Transactions on Information and System Security, vol.6, issue.1, pp.71-127, 2003. ,
DOI : 10.1145/605434.605437
Policy evaluation for network management, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064), pp.1107-1116, 2000. ,
DOI : 10.1109/INFCOM.2000.832468
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.21.9911
Integrity considerations for secure computer systems, 1977. ,
The growth of Diaspora - A decentralized online social network in the wild, 2012 Proceedings IEEE INFOCOM Workshops, pp.13-18, 2012. ,
DOI : 10.1109/INFCOMW.2012.6193476
Federated Identity Management Systems: A Privacy-Based Characterization, IEEE Security & Privacy, vol.11, issue.5, 2012. ,
DOI : 10.1109/MSP.2013.114
The Emperor's old armor, Proceedings of the 1996 workshop on New security paradigms , NSPW '96, pp.2-16, 1996. ,
DOI : 10.1145/304851.304855
KeyNote: Trust Management for Public-Key Infrastructures, Security Protocols, pp.59-63, 1999. ,
DOI : 10.1007/3-540-49135-X_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.7909
Decentralized trust management, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.164-173, 1996. ,
DOI : 10.1109/SECPRI.1996.502679
Attribute-based access control models and implementation in cloud infrastructure as a service, 2014. ,
Enhancing Access-Control with Risk-Metrics for Collaboration on Social Cloud-Platforms, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.864-871, 2015. ,
DOI : 10.1109/Trustcom.2015.458
URL : https://hal.archives-ouvertes.fr/hal-01240381
Access Control Framework Within a Collaborative PaaS Platform, Enterprise Interoperability VI, pp.465-476, 2014. ,
DOI : 10.1007/978-3-319-04948-9_39
URL : https://hal.archives-ouvertes.fr/hal-01103041
Trust-Based Formal Delegation Framework for Enterprise Social Networks, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.127-134, 2015. ,
DOI : 10.1109/Trustcom.2015.366
URL : https://hal.archives-ouvertes.fr/hal-01240387
Efficient Active Novel Class Detection for Data Stream Classification, 2014 22nd International Conference on Pattern Recognition, pp.2826-2831, 2014. ,
DOI : 10.1109/ICPR.2014.487
URL : https://hal.archives-ouvertes.fr/hal-01065043
An adaptive streaming active learning strategy based on instance weighting, Pattern Recognition Letters, vol.70, pp.38-44, 2016. ,
DOI : 10.1016/j.patrec.2015.11.010
URL : https://hal.archives-ouvertes.fr/hal-01254510
The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.206-214, 1989. ,
DOI : 10.1109/SECPRI.1989.36295
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.8977
A security risk measurement for the radac model, 2007. ,
Reasoning about XACML policies using CSP, Proceedings of the 2005 workshop on Secure web services , SWS '05, pp.28-35, 2005. ,
DOI : 10.1145/1103022.1103028
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.1935
A robust reputation system for peer-to-peer and mobile ad-hoc networks, 2004. ,
Using trust for secure collaboration in uncertain environments [48] Capterra. Top Social Networking Software Products. http://www.capterra.com/ social-networking-software, 2003. ,
Rule-Based Access Control for Social Networks, On the Move to Meaningful Internet Systems 2006 : OTM 2006 Workshops, pp.1734-1744, 2006. ,
DOI : 10.1007/11915072_80
Enforcing access control in Web-based social networks, ACM Transactions on Information and System Security, vol.13, issue.1, p.6, 2009. ,
DOI : 10.1145/1609956.1609962
URL : http://hdl.handle.net/11383/1706212
TrustBAC, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.49-58, 2006. ,
DOI : 10.1145/1133058.1133067
Horn clause queries and generalizations, The Journal of Logic Programming, vol.2, issue.1, pp.1-15, 1985. ,
DOI : 10.1016/0743-1066(85)90002-0
URL : http://doi.org/10.1016/0743-1066(85)90002-0
Relationship-Based Access Control for Online Social Networks: Beyond User-to-User Relationships, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing, pp.646-655, 2012. ,
DOI : 10.1109/SocialCom-PASSAT.2012.57
A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, pp.184-184, 1987. ,
DOI : 10.1109/SP.1987.10001
Programming in PROLOG, 2003. ,
DOI : 10.1007/978-3-642-97596-7
Fine Grained Access Control with Trust and Reputation Management for Globus, On the Move to Meaningful Internet Systems, pp.1505-1515, 2007. ,
DOI : 10.1007/978-3-540-76843-2_26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.4495
Managing privacy in identity management?the way forward ,
Delegation in role-based access control, International Journal of Information Security, vol.32, issue.3, pp.123-136, 2008. ,
DOI : 10.1007/s10207-007-0044-8
The desk reference of statistical quality methods, 2000. ,
Administration Model for Or-BAC, On The Move to Meaningful Internet Systems 2003 : OTM 2003 Workshops, pp.754-768, 2003. ,
DOI : 10.1007/978-3-540-39962-9_76
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.2905
Modelling contexts in the Or-BAC model, 19th Annual Computer Security Applications Conference, 2003. Proceedings., pp.416-425, 2003. ,
DOI : 10.1109/CSAC.2003.1254346
Safebook: A privacy-preserving online social network leveraging on real-life trust, IEEE Communications Magazine, vol.47, issue.12, pp.4794-101, 2009. ,
DOI : 10.1109/MCOM.2009.5350374
URL : https://hal.archives-ouvertes.fr/hal-00687143
The Ponder Policy Specification Language, Policies for Distributed Systems and Networks, pp.18-38, 2001. ,
DOI : 10.1007/3-540-44569-2_2
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.17.4489
Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile, Trust, Privacy and Security in Digital Business, pp.18-29, 2015. ,
DOI : 10.1007/978-3-319-22906-5_2
Generic aaa architecture, 2000. ,
Domain Based Access Control Model for Distributed Collaborative Applications, 2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06), pp.24-24, 2006. ,
DOI : 10.1109/E-SCIENCE.2006.261108
Risk Models for Trust-Based Access Control(TBAC), Trust Management, pp.364-371, 2005. ,
DOI : 10.1007/11429760_25
Using trust and risk in role-based access control policies, Proceedings of the ninth ACM symposium on Access control models and technologies , SACMAT '04, pp.156-162, 2004. ,
DOI : 10.1145/990036.990062
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.146.1015
A Public-Key Protocol for Social Networks with Private Relationships, In Modeling Decisions for Artificial Intelligence, pp.373-379, 2007. ,
DOI : 10.1007/978-3-540-73729-2_35
Risk-based dynamic access control for a highly scalable cloud federation, 7th International Conference on Emerging Security Information Systems and Technologies, pp.8-13, 2013. ,
Modèles et politiques de sécurité pour les domaines de la santé et des affaires sociales, 2003. ,
Multi-orbac : A new access control model for distributed, heterogeneous and collaborative systems, 8th IEEE International Symposium on Systems and Information Security, 2006. ,
Xacml 3.0 analysis, 2015. ,
Social network sites : Definition, history, and scholarship, Journal of Computer- Mediated Communication, vol.13, issue.1, pp.210-230, 2007. ,
A comprehensive modeling framework for role-based access control policies, Journal of Systems and Software, vol.107, 2015. ,
DOI : 10.1016/j.jss.2015.05.015
Role-based access control, 2003. ,
Using Authority Certificates to Create Management Structures, Security Protocols, pp.134-145, 2002. ,
DOI : 10.1007/3-540-45807-7_21
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.135.3367
Delegation Protocols in Human-Centric Workflows, 2011 IEEE 13th Conference on Commerce and Enterprise Computing, pp.219-224, 2011. ,
DOI : 10.1109/CEC.2011.38
URL : https://hal.archives-ouvertes.fr/hal-00643449
A modeling approach to federated identity and access management, Special interest tracks and posters of the 14th international conference on World Wide Web , WWW '05, pp.1156-1157, 2005. ,
DOI : 10.1145/1062745.1062916
Can we trust trust. Trust : Making and breaking cooperative relations, pp.213-237, 2000. ,
An architecture for practical delegation in a distributed system, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, pp.20-30, 1990. ,
DOI : 10.1109/RISP.1990.63835
Flexible team-based access control using contexts, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.21-27, 2001. ,
DOI : 10.1145/373256.373259
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.9949
Flexible team-based access control using contexts, Proceedings of the sixth ACM symposium on Access control models and technologies , SACMAT '01, pp.21-27, 2001. ,
DOI : 10.1145/373256.373259
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.9949
A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous Systems, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07), pp.698-703, 2007. ,
DOI : 10.1109/MUE.2007.13
Access control for large collections, ACM Transactions on Information Systems, vol.15, issue.2, pp.154-194, 1997. ,
DOI : 10.1145/248625.248652
Integrating Security Risk Management into Business Process Management for the Cloud, 2014 IEEE 16th Conference on Business Informatics, pp.86-93, 2014. ,
DOI : 10.1109/CBI.2014.29
URL : https://hal.archives-ouvertes.fr/hal-01095868
CooPeD: Co-owned Personal Data management, Computers & Security, vol.47, pp.41-65, 2014. ,
DOI : 10.1016/j.cose.2014.06.003
CISSP Exam Cram 2, Que Corp, 2005. ,
Security assertions markup language, pp.1-24, 2001. ,
A survey on policy languages in network and security management, Computer Networks, vol.56, issue.1, pp.477-489, 2012. ,
DOI : 10.1016/j.comnet.2011.09.014
The oauth 2.0 authorization framework, 2012. ,
DOI : 10.17487/rfc6749
Protection in operating systems, Communications of the ACM, vol.19, issue.8, pp.461-471, 1976. ,
DOI : 10.1145/360303.360333
Guide to attribute based access control (abac) definition and considerations, p.162, 2014. ,
DOI : 10.6028/NIST.SP.800-162
Attribute-Based Access Control, Computer, vol.48, issue.2, pp.85-88, 2015. ,
DOI : 10.1109/MC.2015.33
SecureFlow, Proceedings of the fourth ACM workshop on Role-based access control , RBAC '99, pp.83-94, 1999. ,
DOI : 10.1145/319171.319179
Software Abstractions : logic, language, and analysis, 2012. ,
Flexible support for multiple access control policies, ACM Transactions on Database Systems, vol.26, issue.2, pp.214-260, 2001. ,
DOI : 10.1145/383891.383894
A logical language for expressing authorizations, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.31-42, 1997. ,
DOI : 10.1109/SECPRI.1997.601312
A logical language for expressing authorizations, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), pp.31-42, 1997. ,
DOI : 10.1109/SECPRI.1997.601312
Attribute-based access control models and implementation in cloud infrastructure as a service, THE UNIVERSITY OF TEXAS AT SAN ANTONIO, 2014. ,
A Linear time algorithm for deciding security, 17th Annual Symposium on Foundations of Computer Science (sfcs 1976), pp.33-41, 1976. ,
DOI : 10.1109/SFCS.1976.1
Trust and reputation systems In Foundations of security analysis and design IV, pp.209-245, 2007. ,
A survey of trust and reputation systems for online service provision. Decision support systems, pp.618-644, 2007. ,
Fine-grained role-based delegation in presence of the hybrid role hierarchy, Proceedings of the eleventh ACM symposium on Access control models and technologies , SACMAT '06, pp.81-90, 2006. ,
DOI : 10.1145/1133058.1133071
Temporal hierarchies and inheritance semantics for GTRBAC, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.74-83, 2002. ,
DOI : 10.1145/507711.507724
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.85.6080
The beta reputation system, Proceedings of the 15th bled electronic commerce conference, pp.41-55, 2002. ,
A policy language for a pervasive computing environment, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.63-74, 2003. ,
DOI : 10.1109/POLICY.2003.1206958
A delegation based model for distributed trust, Workshop on Autonomy, Delegation, and Control : Interacting with Autonomous Agents, International Joint Conferences on Artificial Intelligence, 2001. ,
Oauth and openid 2.0. From End-to-End to Trust-to-Trust, p.18, 2008. ,
Organization based access control, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp.120-131, 2003. ,
DOI : 10.1109/POLICY.2003.1206966
URL : https://hal.archives-ouvertes.fr/hal-01483818
An Attribute Based Framework for Risk-Adaptive Access Control Models, 2011 Sixth International Conference on Availability, Reliability and Security, pp.236-241, 2011. ,
DOI : 10.1109/ARES.2011.41
Backus normal form vs. backus naur form Analyzing web access control policies, WWW, pp.735-736, 1964. ,
DOI : 10.1145/355588.365140
Expressing Access Control Policies with an Event-Based Approach, CAiSE Workshops, pp.607-621, 2011. ,
DOI : 10.1007/978-3-642-00199-4_2
URL : https://hal.archives-ouvertes.fr/hal-01224638
A logic-based calculus of events, Foundations of knowledge base management, pp.23-55, 1989. ,
Adding Attributes to Role-Based Access Control, Computer, vol.43, issue.6, pp.79-81, 2010. ,
DOI : 10.1109/MC.2010.155
Cloud federation, Proceedings of the 2nd International Conference on Cloud Computing, GRIDs, and Virtualization (CLOUD COMPUTING 2011), 2011. ,
Protection, ACM SIGOPS Operating Systems Review, vol.8, issue.1, pp.18-24, 1974. ,
DOI : 10.1145/775265.775268
Developing Software Online With Platform-as-a-Service Technology, Computer, vol.41, issue.6, pp.13-15, 2008. ,
DOI : 10.1109/MC.2008.185
Usage control in computer security: A survey, Computer Science Review, vol.4, issue.2, pp.81-99, 2010. ,
DOI : 10.1016/j.cosrev.2010.02.002
Criteria for Evaluating the Privacy Protection Level of Identity Management Services, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp.155-160, 2009. ,
DOI : 10.1109/SECURWARE.2009.31
Cardea : Dynamic access control in distributed systems, System, vol.13, issue.13, pp.4-6, 2004. ,
Foundations for the situation calculus, Linköping Electronic Articles in Computer and Information Science, vol.3, issue.18, 1998. ,
Datalog with Constraints: A Foundation for Trust Management Languages, Practical Aspects of Declarative Languages, pp.58-73, 2003. ,
DOI : 10.1007/3-540-36388-2_6
A role-based trust-management framework, p.201, 2003. ,
Trust-based access control for collaborative system CCCM'08, Computing, Communication, Control, and Management, pp.444-448, 2008. ,
DOI : 10.1109/cccm.2008.203
A flexible role-based delegation model with dynamic delegation role structure ,
A policy description language, AAAI/IAAI, pp.291-298, 1999. ,
On the complexity of role updating feasibility problem in RBAC, Information Processing Letters, vol.114, issue.11, pp.597-602, 2014. ,
DOI : 10.1016/j.ipl.2014.06.003
Method and system for providing authorization, authentication, and accounting for a virtual private network, 2008. ,
Ubiquitous computing, Communications of the ACM, vol.45, issue.12, pp.63-96, 2002. ,
User-managed access to web resources, Proceedings of the 6th ACM workshop on Digital identity management, DIM '10, pp.35-44, 2010. ,
DOI : 10.1145/1866855.1866865
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.161.7027
Assertions and protocols for the oasis security assertion markup language (saml), OASIS, 2003. ,
Access control policies : Modeling and validation, 5th NOTERE Conference (Nouvelles Technologies de la Répartition, pp.85-91, 2005. ,
Formalisation and Implementation of the XACML Access Control Mechanism, Engineering Secure Software and Systems, pp.60-74, 2012. ,
DOI : 10.1007/978-3-642-28166-2_7
Model-based Management of Information System Security Risk, 2009. ,
URL : https://hal.archives-ouvertes.fr/tel-00402996
Rational Fictions: Central Bank Independence and the Social Logic of Delegation, West European Politics, vol.25, issue.1, pp.47-76, 2002. ,
DOI : 10.1080/713601585
The imposition of protocols over open distributed systems, IEEE Transactions on Software Engineering, vol.17, issue.2, pp.183-195, 1991. ,
DOI : 10.1109/32.67599
Risk-based security decisions under uncertainty, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASKY '12, pp.157-168, 2012. ,
DOI : 10.1145/2133601.2133622
URL : https://hal.archives-ouvertes.fr/hal-00757539
Ctte : support for developing and analyzing task models for interactive system design. Software Engineering, IEEE Transactions on, vol.28, issue.8, pp.797-813, 2002. ,
Extensible access control markup language (xacml) version 2.0. Oasis Standard, 2005. ,
Discrete event calculus reasoner documentation. Software documentation, p.704, 2008. ,
DOI : 10.1016/b978-012369388-4/50070-9
Commonsense reasoning, 2010. ,
Commonsense Reasoning : An Event Calculus Based Approach, 2014. ,
DOI : 10.1145/1435417.1435443
A computational model of trust and reputation, Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp.2431-2439, 2002. ,
DOI : 10.1109/HICSS.2002.994181
XACML-Based Access Control for Decentralized Online Social Networks, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing, pp.671-676, 2014. ,
DOI : 10.1109/UCC.2014.108
Towards a Flexible Framework to Support a Generalized Extension of XACML for Spatio-temporal RBAC Model with Reasoning Ability, ICCSA (5), 2013. ,
DOI : 10.1007/978-3-642-39640-3_32
xfACL, Proceedings of the 16th ACM symposium on Access control models and technologies, SACMAT '11, pp.61-72, 2011. ,
DOI : 10.1145/1998441.1998451
Risk-based access control systems built on fuzzy inferences, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.250-260, 2010. ,
DOI : 10.1145/1755688.1755719
usage control model, ACM Transactions on Information and System Security, vol.7, issue.1, pp.128-174, 2004. ,
DOI : 10.1145/984334.984339
Role-based access control on the web, ACM Transactions on Information and System Security, vol.4, issue.1, pp.37-71, 2001. ,
DOI : 10.1145/383775.383777
Ubiquitous computing : smart devices, environments and interactions, 2011. ,
DOI : 10.1002/9780470779446
Risk management framework : Helping organizations implement effective information security programs, INS Whitepaper, 2009. ,
An algebra for fine-grained integration of XACML policies, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.63-72, 2009. ,
DOI : 10.1145/1542207.1542218
A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications, Trust, Privacy and Security in Digital Business, pp.48-58, 2008. ,
DOI : 10.1007/978-3-540-85735-8_6
Openid authentication 2.0-final, 2007. ,
De la confiance. article paru dans la revue L'enseignement philosophique, 2000. ,
URL : https://hal.archives-ouvertes.fr/halshs-00153541
extensible access control markup language (xacml) version 3, 2013. ,
Dynamic delegation framework for role based access control in distributed data management systems. Distributed and Parallel Databases, pp.245-269, 2014. ,
An Abductive Approach for Analysing Event-Based Requirements Specifications, 2002. ,
DOI : 10.1007/3-540-45619-8_3
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.4878
Time limited collaborative community role delegation policy, US Patent, vol.7, p.415498, 2008. ,
Multi-trust_orbac : Access control model for multi-organizational critical systems migrated to the cloud, 2013. ,
The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, 2000. ,
DOI : 10.1145/344287.344301
Expressive Power of the Schematic Protection Model*, Journal of Computer Security, vol.1, issue.1, pp.59-98, 1992. ,
DOI : 10.3233/JCS-1992-1104
Lattice-based access control models, Computer, vol.26, issue.11, pp.9-19, 1993. ,
DOI : 10.1109/2.241422
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.5742
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
Access control: principle and practice, IEEE Communications Magazine, vol.32, issue.9, pp.40-48, 1994. ,
DOI : 10.1109/35.312842
Towards a Formal Framework for Computational Trust, Formal Methods for Components and Objects, pp.175-184, 2007. ,
DOI : 10.1007/978-3-540-74792-5_8
SoNet -- Privacy and Replication in Federated Online Social Networks, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops, pp.51-57, 2013. ,
DOI : 10.1109/ICDCSW.2013.20
Policy administration control and delegation using XACML and Delegent, The 6th IEEE/ACM International Workshop on Grid Computing, 2005., pp.49-54, 2005. ,
DOI : 10.1109/GRID.2005.1542723
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.360.2520
Prpl : a decentralized social networking infrastructure, Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services : Social Networks and Beyond, p.8, 2010. ,
Dynamic risk-based decision methods for access control systems, Computers & Security, vol.31, issue.4, pp.447-464, 2012. ,
DOI : 10.1016/j.cose.2012.02.006
The Event Calculus Explained, Artificial intelligence today, pp.409-430, 1999. ,
DOI : 10.1016/S0004-3702(96)00033-1
SuperNova: Super-peers based architecture for decentralized online social networks, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012), pp.1-10, 2012. ,
DOI : 10.1109/COMSNETS.2012.6151349
URL : http://arxiv.org/abs/1105.0074
Federated identity management, Computer, vol.38, issue.12, pp.120-122, 2005. ,
DOI : 10.1109/MC.2005.408
An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system, Future Generation Computer Systems, vol.31, pp.147-168, 2014. ,
DOI : 10.1016/j.future.2013.05.010
URL : https://hal.archives-ouvertes.fr/hal-00835887
TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources, Autonomous Agents and Multi-Agent Systems, vol.19, issue.1, pp.183-198, 2006. ,
DOI : 10.1007/s10458-006-5952-x
X-strowl : A generalized extension of xacml for context-aware spatiotemporal rbac model with owl, Digital Information Management (ICDIM), 2012 Seventh International Conference on, pp.253-258, 2012. ,
Team-based access control (TMAC), Proceedings of the second ACM workshop on Role-based access control , RBAC '97, pp.13-19, 1997. ,
DOI : 10.1145/266741.266748
Integrated constraints and inheritance in DTAC, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.93-102, 2000. ,
DOI : 10.1145/344287.344307
Context-aware authorization in highly dynamic environments. arXiv preprint, 2011. ,
Information security management handbook, 2003. ,
Trust-orBAC: A Trust Access Control Model in Multi-Organization Environments, Information Systems Security, pp.89-103, 2012. ,
DOI : 10.1007/978-3-642-35130-3_7
URL : https://hal.archives-ouvertes.fr/hal-00767797
A Contract-based and Trust-aware Collaboration Model, 2012. ,
URL : https://hal.archives-ouvertes.fr/tel-00769076
Decentralized composite access control [192] S. University of Murcia (UMU) UMU-XACML-Edito version 1.3.2, 2009. ,
DOI : 10.1007/978-3-642-54792-8_14
URL : http://e-collection.ethbib.ethz.ch/show?type=bericht&nr=1010
Supporting Authorization Reasoning Based on Role and Resource Hierarchies in an Ontology-Enriched XACML Model, International Journal of Computer and Communication Engineering, vol.3, issue.3, p.155, 2014. ,
DOI : 10.7763/IJCCE.2014.V3.311
Quantified risk-adaptive access control for patient privacy protection in health information systems, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, pp.406-410, 2011. ,
DOI : 10.1145/1966913.1966969
Team-and-role-based organizational context and access control for cooperative hypermedia environments, Proceedings of the tenth ACM Conference on Hypertext and hypermedia : returning to our diverse roots returning to our diverse roots, HYPERTEXT '99, pp.37-46, 1999. ,
DOI : 10.1145/294469.294480
A purpose-based access control model, Information Assurance and Security IAS 2007. Third International Symposium on, pp.143-148, 2007. ,
An adaptable distributed trust management framework for largescale secure service-based systems, Computing, issue.10, pp.96925-949, 2014. ,
Gouvernance de service : aspects sécurité et données, 2011. ,
CATT: A Cloud Based Authorization Framework with Trust and Temporal Aspects, Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp.285-294, 2014. ,
DOI : 10.4108/icst.collaboratecom.2014.257312
URL : https://hal.archives-ouvertes.fr/hal-01103043
DISC: A Declarative Framework for Self-Healing Web Services Composition, 2010 IEEE International Conference on Web Services, pp.25-33, 2010. ,
DOI : 10.1109/ICWS.2010.70
URL : https://hal.archives-ouvertes.fr/inria-00537975
DISC: A Declarative Framework for Self-Healing Web Services Composition, 2010 IEEE International Conference on Web Services, 2010. ,
DOI : 10.1109/ICWS.2010.70
URL : https://hal.archives-ouvertes.fr/inria-00537975
DISC-SeT: Handling Temporal and Security Aspects in the Web Services Composition, 2010 Eighth IEEE European Conference on Web Services, pp.51-58, 2010. ,
DOI : 10.1109/ECOWS.2010.18
URL : https://hal.archives-ouvertes.fr/inria-00537976
An Event-Based Reasoning Approach to Web Services Monitoring, 2011 IEEE International Conference on Web Services, 2011. ,
DOI : 10.1109/ICWS.2011.97
URL : https://hal.archives-ouvertes.fr/inria-00596461
A role-based delegation framework for healthcare information systems, Proceedings of the seventh ACM symposium on Access control models and technologies , SACMAT '02, pp.125-134, 2002. ,
DOI : 10.1145/507711.507731
A rule-based framework for role-based delegation and revocation, ACM Transactions on Information and System Security, vol.6, issue.3, pp.404-441, 2003. ,
DOI : 10.1145/937527.937530